Traditional intrusion detection systems (IDSs) focus on low-level attacks and anomalies, and raise alerts independently, though there may be logical connections between them. In this paper, a method of correlating intrusion alerts into attack scenarios based on the improved evolving self-organizing map (IESOM) was proposed. IESOM gives a rational formula to calculate the initial values of connection strengths instead of assigning some experiential or tentative constants as connection strength values in ESOM. IESOM is an evolving extension of the self-organizing map (SOM) model, which allows for an evolvable network structure and very fast incremental learning. System of correlating intrusion alerts into attack scenarios based on IESOM has f...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Abstract- Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, an...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Abstract: Alert correlation is a system that receives alerts from heterogeneous Intrusion Detection ...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
Traditional intrusion detection systems (IDSs) focus on lowlevel attacks or anomalies, and raise ale...
Abstract. A growing trend in the cybersecurity landscape is repre-sented by multistep attacks that i...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Abstract- Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, an...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Abstract: Alert correlation is a system that receives alerts from heterogeneous Intrusion Detection ...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
Traditional intrusion detection systems (IDSs) focus on lowlevel attacks or anomalies, and raise ale...
Abstract. A growing trend in the cybersecurity landscape is repre-sented by multistep attacks that i...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Abstract- Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, an...